ua nt - p h / 03 10 15 6 v 1 2 6 O ct 2 00 3 Quantum and classical advantage distillation are not equivalent
نویسندگان
چکیده
We report that, for the generation of a secure cryptographic key from correlations established through a noisy quantum channel, the quantum and classical advantage distillation procedures are not equivalent, when coherent eavesdropping attacks are duly taken into account. The quantum procedure can tolerate markedly more noise in the channel than the classical procedure. One of the important problems in quantum cryptography is whether classical methods of key distillation are equivalent to quantum methods. This problem was recently investigated for a certain class of protocols in Refs. [1, 2, 3]. It was concluded there that the quantum entanglement distillation [4] tolerates exactly the same amount of errors in a raw cryptographic key as classical advantage distillation [5]. The analysis was carried out under the assumption that Eve performs the most general incoherent attack. In this short note [6] we report that this equivalence is only apparent, in fact classical advantage distillation is not as powerful as quantum entanglement distillation. This is so because Eve has the option of coherent attacks
منابع مشابه
ua nt - p h / 04 03 11 8 v 1 1 6 M ar 2 00 4 Experimental Purification of Single Qubits
We report the experimental realization of the purification protocol for single qubits sent through a depolarization channel. The qubits are associated with polarization encoded photon particles and the protocol is achieved by means of passive linear optical elements. The present approach may represent a convenient alternative to the distillation and error correction protocols of quantum informa...
متن کاملua nt - p h / 01 01 09 8 v 2 18 S ep 2 00 1 Quantum cryptography
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principl...
متن کاملar X iv : q ua nt - p h / 06 10 15 3 v 1 18 O ct 2 00 6 Subsystem Codes
We investigate various aspects of operator quantum error-correcting codes or, as we prefer to call them, subsystem codes. We give various methods to derive subsystem codes from classical codes. We give a proof for the existence of subsystem codes using a counting argument similar to the quantum Gilbert-Varshamov bound. We derive linear programming bounds and other upper bounds. We answer the qu...
متن کاملar X iv : q ua nt - p h / 02 03 04 6 v 1 1 1 M ar 2 00 2 Quantum imaging
We provide a brief overview of the newly born field of quantum imaging, and discuss some concepts that lie at the root of this field.
متن کاملua nt - p h / 03 10 18 6 v 1 3 1 O ct 2 00 3 There Is No Basis Ambiguity in Everett Quantum Mechanics ∗
The Everett-interpretation description of isolated measurements, i.e., measurements involving interaction between a measuring apparatus and a measured system but not interaction with the environment, is shown to be unambiguous, claims in the literature to the contrary notwithstanding. The appearance of ambiguity in such measurements is engendered by the fact that, in the Schrödinger picture, in...
متن کامل